-
1
-
-
70349256703
-
-
Directive 95-46-EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Available at, 1995
-
Directive 95-46-EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Available at http://ec.europa.eu/justice-home/fsj/privacy, 1995.
-
e-home/fsj/privacy
-
-
-
2
-
-
70349242596
-
-
IBM Entity Analytic Solutions. Available at http://ibm.com/db2/eas, 2005.
-
IBM Entity Analytic Solutions. Available at http://ibm.com/db2/eas, 2005.
-
-
-
-
5
-
-
79960860547
-
Privacy-Preserving Graph Algorithms in the Semi-honest Model
-
J. Brickell, and V. Shmatikov. Privacy-Preserving Graph Algorithms in the Semi-honest Model. Proceedings of AsiaCrypt, 2005.
-
(2005)
Proceedings of AsiaCrypt
-
-
Brickell, J.1
Shmatikov, V.2
-
6
-
-
0002626155
-
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
-
R. Cramer, I. Damgard, and U. Maurer. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. Proceedings of EuroCrypt, 2000.
-
(2000)
Proceedings of EuroCrypt
-
-
Cramer, R.1
Damgard, I.2
Maurer, U.3
-
10
-
-
33746065125
-
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
-
I. Damgard, M. Fitzi, E. Kiltz, J. Nielsen, and T. Toft. Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. Proceedings of Theoretical Cryptography Conference, 2006.
-
(2006)
Proceedings of Theoretical Cryptography Conference
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
11
-
-
0002908662
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
I. Damgard, and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Proceedings of Public Key Cryptography, 2001.
-
(2001)
Proceedings of Public Key Cryptography
-
-
Damgard, I.1
Jurik, M.2
-
12
-
-
33644786764
-
Privacy Preserving Link Analysis on Dynamic Weighted Graph
-
Y. Duan, J. Wang, M. Kam, and J. Canny. Privacy Preserving Link Analysis on Dynamic Weighted Graph. Computational & Mathematical Organization Theory 11(2), 2005.
-
(2005)
Computational & Mathematical Organization Theory
, vol.11
, Issue.2
-
-
Duan, Y.1
Wang, J.2
Kam, M.3
Canny, J.4
-
13
-
-
84945709831
-
Algorithm 97: Shortest Path
-
R. Floyd. Algorithm 97: Shortest Path. Communications of the ACM 5(6), 1962.
-
(1962)
Communications of the ACM
, vol.5
, Issue.6
-
-
Floyd, R.1
-
18
-
-
0016494374
-
The application of link analysis to police intelligence
-
W. Harper, and D. Harris. The application of link analysis to police intelligence. Human Factors 17(2), 1975.
-
(1975)
Human Factors
, vol.17
, Issue.2
-
-
Harper, W.1
Harris, D.2
-
20
-
-
0000277371
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proceedings of EUROCRYPT, 1999.
-
(1999)
Proceedings of EUROCRYPT
-
-
Paillier, P.1
-
21
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig, and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
-
-
Pohlig, S.1
Hellman, M.2
-
23
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
M. Sparrow. The application of network analysis to criminal intelligence: an assessment of the prospects. Social Networks 13, 1991.
-
(1991)
Social Networks
, vol.13
-
-
Sparrow, M.1
-
26
-
-
20344376408
-
Criminal Network Analysis and Visualization
-
J. Xu, and H. Chen. Criminal Network Analysis and Visualization. Communications of the ACM 48(6), 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.6
-
-
Xu, J.1
Chen, H.2
|